Share
## https://sploitus.com/exploit?id=7F1831CC-811A-5BB6-9BBD-6BDA7F7B25A0
> 本仓库仅用作备份,非原创,请自行测试可用性
# CVE-2024-38077-EXP
【修复版,作者:qi4L】
有效范围:仅 Windows Server 2025
使用方法:
```
options:
-h, --help show this help message and exit
--target_ip TARGET_IP
Target IP, eg: 192.168.120.1
--evil_ip EVIL_IP Evil IP, eg: 192.168.120.2
--evil_dll_path EVIL_DLL_PATH
Evil dll path, eg: \smb\evil_dll.dll
--check_vuln_exist CHECK_VULN_EXIST
Check vulnerability exist before exploit
```
https://github.com/qi4L/CVE-2024-38077
# CVE-2024-38077-POC
【伪代码,作者:zhiniangpeng】
漏洞作者已经发布分析文章第一篇:https://sites.google.com/site/zhiniangpeng/blogs/MadLicense (× 已删除)
![image](https://github.com/user-attachments/assets/ffd4ba94-074d-4104-b6bf-7ee536b45ac2)